1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill115 [55]
2 years ago
5

File details such as the document title and author name are called ____.

Computers and Technology
1 answer:
MA_775_DIABLO [31]2 years ago
5 0

Answer:

Document properties

Explanation:

From the list of given options, document properties answers the question.

Every computer file has its details which include (but not limited to) the file name, file type, file permission, date etc.

The above details and many more are makes it easy to identify files.

To get a document property, right click on the file/document, select properties, then select the details tab.

On the details tab, you will see a comprehensive list of the properties attributed to that particular documents

You might be interested in
In addition to compiling the list of user access requirements, applications, and systems, the BIA also includes processes that a
laila [671]

Answer:

automated

Explanation:

Basically a Business Impact Analysis (BIA) estimates and determines the effects of a business activity and process disturbances. These disruptions can be natural or electronic disasters. It also collects information which is used to establish recovery plan. It identifies the business vulnerabilities and works on the strategies in order to reduce such potential hazards. The BIA involves both manual and automated processes. BIA involves automated processes which include the automated software tools that enables the protection of the confidential information of the users and also generates automated reports about the critical business processes.

5 0
3 years ago
How bout these chose your fave for bnha
VARVARA [1.3K]
The third one is mine
6 0
3 years ago
Read 2 more answers
Linda installed a special pool for the hydrotherapeutic treatment of severe arthritis, as prescribed by her doctor. The cost of
stellarik [79]

Answer:

Linda is entitled to deduction (before any AGI limitations) of $896 in one year of installation of the pool.

Explanation:

Following is explained calculation for deduction (before any AGI limitations) that is Linda entitled to in the year of installation of the pool.

Given that:

Cost of Installing the pool = $22,400

Paid by insurance company = $5,600

So by deducting the price paid by insurance company from total cost the balance becomes:

Balance = $22,400 - $5,600 = $ 16,800

As the pool increased the value of house by $7,840 so we will deduct this amount from balance:

Balance = $ 16,800 - $7,840 = $8,960

As the useful life given for pool is 10 years so we will divide the balance with 10 to obtain the deduction amount for 1 year:

Deduction amount for one year = $8,960/10 = $8,96

Hence $8,96 will be deducted in one year installation.

i hope it will help you!

7 0
3 years ago
To turn off the AutoCorrect features, navigate to the AutoCorrect menu and deselect the box labeled_____.
barxatty [35]
Option A-Show AutoCorrect buttons, then you have the options to hide the autocorrect or to turn it on/off
4 0
3 years ago
Read 2 more answers
Law enforcement has contacted a corporation's legal counsel because correlated data from a breach shows the organization as the
Art [367]

Answer:

A is the correct answer.

Explanation:

Perform security awareness training about incident communication.

6 0
3 years ago
Other questions:
  • . Gathering information with your eyes is called __________.
    6·1 answer
  • Technologies designed to replace operating systems and services when they fail are called what?
    15·1 answer
  • 10^4+10-2=<br>10^4+10-2=
    12·2 answers
  • Can someone please help me with this pleaseeeee
    12·1 answer
  • 1. Consider a direct-mapped cache that can accommodate 8Mbytes from a main memory, that uses a 32-bit address and 32-byte blocks
    5·1 answer
  • A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t
    10·1 answer
  • It is necessary tto save updates often when working in google docs? True or false
    11·2 answers
  • The name of a person their address and their contact information like phone number and email address or consider the minimum inf
    9·1 answer
  • _________ media must be downloaded in its entirety to the user's computer before it can be heard or seen
    5·1 answer
  • What is htc one mseven​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!